{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T10:33:25Z","timestamp":1725532405905},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642013980"},{"type":"electronic","value":"9783642013997"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-01399-7_23","type":"book-chapter","created":{"date-parts":[[2009,5,6]],"date-time":"2009-05-06T01:18:41Z","timestamp":1241572721000},"page":"287-300","source":"Crossref","is-referenced-by-count":3,"title":["Enhancing Application Identification by Means of Sequential Testing"],"prefix":"10.1007","author":[{"given":"Mohamad","family":"Jaber","sequence":"first","affiliation":[]},{"given":"Chadi","family":"Barakat","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/978-3-540-31966-5_4","volume-title":"Passive and Active Network Measurement","author":"A. Moore","year":"2005","unstructured":"Moore, A., Papagiannaki, K.: Toward the accurate identification of network applications. In: Dovrolis, C. (ed.) PAM 2005. LNCS, vol.\u00a03431, pp. 41\u201354. Springer, Heidelberg (2005)"},{"key":"23_CR2","doi-asserted-by":"crossref","unstructured":"Sen, S., Spatscheck, O., Wang, D.: Accurate, scalable in-network identification of p2p traffic using application signatures. In: WWW 2004 Conference, Philadelphia, USA (May 2004)","DOI":"10.1145\/988672.988742"},{"key":"23_CR3","doi-asserted-by":"crossref","unstructured":"Erman, J., Mahanti, A., Arlitt, M.: Internet traffic identification using machine. In: Proc. of 49th IEEE Global Telecommunications Conference (GLOBECOM), San Francisco, USA (November 2006)","DOI":"10.1109\/GLOCOM.2006.443"},{"key":"23_CR4","doi-asserted-by":"crossref","unstructured":"Moore, A., Zuev, D.: Internet traffic classification using bayesian analysis techniques. In: ACM Sigmetrics (2005)","DOI":"10.1145\/1064212.1064220"},{"key":"23_CR5","doi-asserted-by":"crossref","unstructured":"Bernaille, L., Teixeira, R., Salamatian, K.: Early application identification. In: The 2nd ADETTI\/ISCTE CoNEXT Conference, Lisboa, Portugal (December 2006)","DOI":"10.1145\/1368436.1368445"},{"key":"23_CR6","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/1198255.1198257","volume":"37","author":"M. Crotti","year":"2007","unstructured":"Crotti, M., Dusi, M., Gringoli, F., Salgarelli, L.: Traffic classification through simple statistical fingerprinting. ACM-Sigcomm Computer Communication Review\u00a037, 5\u201316 (2007)","journal-title":"ACM-Sigcomm Computer Communication Review"},{"key":"23_CR7","doi-asserted-by":"crossref","unstructured":"Karagiannis, T., Papagiannaki, K., Faloutsos, M.: Blinc: Multilevel traffic classification in the dark. In: SIGCOMM 2005, New York, USA (August 2005)","DOI":"10.1145\/1080091.1080119"},{"key":"23_CR8","volume-title":"Data mining: Practical machine learning tools and techniques","author":"I. Witten","year":"2005","unstructured":"Witten, I., Frank, E.: Data mining: Practical machine learning tools and techniques. Morgan Kaufmann, San Francisco (2005)"},{"key":"23_CR9","unstructured":"TCPdump: Collection of various patches that have been floating around for lbl\u2019s tcpdump and libcap programs (2007), http:\/\/www.tcpdump.org\/"}],"container-title":["Lecture Notes in Computer Science","NETWORKING 2009"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-01399-7_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T17:52:43Z","timestamp":1558288363000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-01399-7_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642013980","9783642013997"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-01399-7_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}